• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 27,647
Next 10 →

Table 2.2: Activity Time Distributions for SAN Subnet for M#2FD#2F1#2F2 Queue

in Analytic solution of stochastic activity networks with exponential and deterministic activities
by Bhavan Pukhraj Shah 1993
Cited by 10

TABLE III: PATH SIGNATURE DISTRIBUTION (When 10 subnets are connected to each AS) (DBM bits) Test 1 Test 2 Test 3 Test 4 Test 5

in unknown title
by unknown authors 2003
Cited by 5

TABLE V: PATH SIGNATURE DISTRIBUTION (When 10 subnets are connected to each AS) Test 1 Test 2 Test 3 Test 4 Test 5

in Mitigating distributed denial-of-service attack with deterministic bit marking
by Yoohwan Kim, Yoohwan Kim, Ju-yeon Jo, Ju-yeon Jo, Frank Merat, Frank Merat, Mei Yang, Mei Yang, Yingtao Jiang, Yingtao Jiang
Cited by 1

Table 1: Node distribution according to Overnet traffic traces. For example, 72% of Overnet is composed of users coming from unique subnets, 14% of Overnet is composed of users coming from subnets with two active users, etc.

in Breaking the Collusion Detection Mechanism of
by Parisa Tabriz, Nikita Borisov
"... In PAGE 7: ... We look to a popular P2P system of similar structure, the Overnet/eDonkey file-sharing system, to provide more realistic statistics [1]. Resulting from traffic probes taken during 2003, Overnet consisted of the subnet to node distribution displayed in Table1... ..."

Table 1: Node distribution according to Overnet traffic traces. For example, 72% of Overnet is composed of users coming from unique subnets, 14% of Overnet is composed of users coming from subnets with two active users, etc.

in Breaking the Collusion Detection Mechanism of
by Parisa Tabriz, Nikita Borisov
"... In PAGE 7: ... We look to a popular P2P system of similar structure, the Overnet/eDonkey file-sharing system, to provide more realistic statistics [1]. Resulting from traffic probes taken during 2003, Overnet consisted of the subnet to node distribution displayed in Table1 [3]. We simulated 5000 tunnel constructions consisting of only honest selections from both the original node distribution in [18] and our own node distribution based on the Overnet traces.... ..."

Table 8: Comparison at Application Layer

in Hierarchical Characterization and Flow Modeling of Computer Network Traffic Using Real-time Measurements
by Madhu K. Acharya, Bharati Bhalla, R.E. Newman-Wolfe, Haniph A. Latchman, Randy Chow
"... In PAGE 18: ... A comparative study of the tra c in the three subnets is now presented. Comparison at Application Layer Table8 shows the application distribution for the three subnets. Internet tra c contributes 100.... ..."

Table 1. Four International Networks and Selected Sub-Nets 1. CIGBnet (950)

in unknown title
by unknown authors
"... In PAGE 1: ... While they currently operate a single node in Havana, they are building a distributed network with 13 serv- ers in Cuban medical schools with support from the Pan American Health Organization and UNESCO. Table1 summarizes these and the more important subnetworks they serve. For more information on these networks, see [14 and 15].... ..."

Table 3: Receiver apos;s State Transition Table It is possible that two or more receivers may become SAs on the same subnet. The protocol operates cor- rectly even under that situation, although some extra information distribution and processing may be in- volved. A simple scheme can be applied to eliminate the extra SA(s).

in unknown title
by unknown authors 1998
"... In PAGE 4: ... The \condition quot; clause indicates that the \condition quot; must be satis ed in order for the transition to take place, the \send quot; opera- tion indicates what message(s) are sent during the transi- tion, the \receive quot; operation indicates what messages are received during the transition, and \action quot; clause indi- cates what action is taken by the protocol entity during the transition. In Table3 , we have used three \condi- tions: quot; (1) Congestion-condition, (2) Load-condition and (3) Unload-condition to assist state transitions. As stated in [8], congestion can be detected by various factors, such as, packet loss rate exceeding a certain threshold, or per- centage of video frames missing deadlines exceeding a threshold.... In PAGE 4: ... Each of these six operations are described below. Refer to Figure 2 and Table3 as the operations are being described. Note that leave-session messages and the operations by IA/SA have not been shown in the state diagram.... ..."
Cited by 139

Table 7: Some sample subnet sizes.

in OSPF packet header. For more information, see Sections 8.1, 8.2, and Appendix E. Author’s Address
by John Moy 1991
"... In PAGE 108: ...ubnets of various sizes. For example, the network 128.185.0.0 could be broken up into 64 variable-sized subnets: 16 subnets of size 4K, 16 subnets of size 256, and 32 subnets of size 8. Table7 shows some of the resulting network... ..."

Table 7: Some sample subnet sizes.

in OSPF packet header. For more information, see Sections 8.1, 8.2, and Appendix E. Author’s Address
by John Moy 1991
"... In PAGE 108: ...ubnets of various sizes. For example, the network 128.185.0.0 could be broken up into 64 variable-sized subnets: 16 subnets of size 4K, 16 subnets of size 256, and 32 subnets of size 8. Table7 shows some of the resulting network... ..."
Next 10 →
Results 1 - 10 of 27,647
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University